How to Level Up Your Security Automation How to Level Up Your Security AutomationSydni Williams-Shaw2026-04-22T17:48:23+00:00March 28, 2025|Read More
Using a Threat-based Approach for Detections: Understanding Bad Actors Using a Threat-based Approach for Detections: Understanding Bad ActorsSydni Williams-Shaw2026-04-22T17:50:39+00:00January 15, 2025|Read More
From Theory to Practice: Testing Your Threat Hunting Hypotheses From Theory to Practice: Testing Your Threat Hunting HypothesesSydni Williams-Shaw2026-04-22T17:51:16+00:00December 19, 2024|Read More
A Deep Dive into Black-Box, White-Box and Grey-Box Penetration Testing A Deep Dive into Black-Box, White-Box and Grey-Box Penetration TestingSydni Williams-Shaw2026-04-22T17:53:11+00:00December 13, 2024|Read More
Adapting Penetration Testing Methods for Cloud Environments Adapting Penetration Testing Methods for Cloud EnvironmentsSydni Williams-Shaw2026-04-22T17:53:55+00:00November 20, 2024|Read More
Unlocking the Power of SIEM in Threat Hunting Unlocking the Power of SIEM in Threat HuntingSydni Williams-Shaw2026-04-22T17:55:39+00:00November 6, 2024|Read More
Distinguishing Between Normal Network Behavior and Potential Cyber Threats Distinguishing Between Normal Network Behavior and Potential Cyber ThreatsSydni Williams-Shaw2026-04-22T17:57:06+00:00October 23, 2024|Read More
How to Implement the Zero Trust Model How to Implement the Zero Trust ModelSydni Williams-Shaw2026-04-22T17:57:46+00:00October 7, 2024|Read More